Abstract
It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service running on a secure device, than to attack the same service running on a general purpose device.
Original language | English |
---|---|
Journal | ITUs skriftserie |
Number of pages | 8 |
ISSN | 1500-7707 |
Publication status | Published - 2014 |
Keywords
- Trusted Computing
- Privacy Guarantees
- Data Management
- Secure Devices
- Trusted Execution Environment